Separation of duty constraints define mutual exclusion relations between two entities (e.g. two permissions). Thus, a software component that supports the definition of separation...
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
The notion of service enjoys increasing popularity as a means for structuring complex distributed systems. Most definitions of the term service, however, refer only to syntactic l...
This paper describes the use of executable specifications to ease incremental development, by providing more flexibility regarding the order in which modules are implemented. In t...
Inspections are an established quality assurance technique. In order to optimize the inspection approach, different reading techniques, such as checklist-based reading and scenari...
Christian Denger, Marcus Ciolkowski, Filippo Lanub...
This paper describes a case study on application of natural language processing in very early stages of the requirements engineering. In our previous work [7] we have shown how na...
In this paper we argue that the explicit capture of crosscutting concerns in code should be the natural consequence of good and clean modularity in analysis and design, based on f...
With wireless communications and mobile hand-held devices becoming a reality, new applications where users can have access to information anytime, anywhere are made possible. To d...
Development of computer communications has catalyzed integration processes in world communities. Initial efforts concerning integration have showed great heterogeneity between dat...
Olena Kaykova, Oleksiy Khriyenko, Mikko Kovalainen...
Consumer devices have domain specific constraints imposed by end-users, device manufacturers and service providers. These constraints focus on the need for security and reliabilit...